TALERE 2025
Dette er en oversigt over alle talere på V2 Security København.
Listen over talere vil blive opdateret løbende.
Vi ser frem til at byde dig velkommen til to dage fyldt med læring, refleksion og inspiration!

Michael Sjøberg
Delta Crisis Management
Hostage & Ransomware Negotiator
KEYNOTE DEBAT | Betaling til gidselstagere i ransomware-sager?
Ransomwareangreb - forhandling eller ej?
Delta Crisis Management
Hostage & Ransomware Negotiator
KEYNOTE DEBAT | Betaling til gidselstagere i ransomware-sager?
Ransomwareangreb - forhandling eller ej?

Nikolaj Juncher Wædegaard
Dansk Erhverv
Vice President & Branchedirektør for Digitalisering, Teknologi, Tele & Strategi
DEBAT | Manglen på it-talenter: Hvordan skaffer vi flere?
Dansk Erhverv
Vice President & Branchedirektør for Digitalisering, Teknologi, Tele & Strategi
DEBAT | Manglen på it-talenter: Hvordan skaffer vi flere?

Paul Rosenzweig
Red Branch Consulting PLLC
Professorial Lecturer in Law at George Washington University and a member of the ABA President’s Task Force on Law and Artificial Intelligence, and the ABA Cybersecurity Legal Task Force
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?
Red Branch Consulting PLLC
Professorial Lecturer in Law at George Washington University and a member of the ABA President’s Task Force on Law and Artificial Intelligence, and the ABA Cybersecurity Legal Task Force
KEYNOTE | The future of American cybersecurity: What can we expect while Trump is in power?

Rasmus Rasmussen
Demant A/S
Vice President, IT, Enterprise Platforms & Security
KEYNOTE DEBAT | Betaling til gidselstagere i ransomware-sager?
Demant A/S
Vice President, IT, Enterprise Platforms & Security
KEYNOTE DEBAT | Betaling til gidselstagere i ransomware-sager?

Rune Espensen
Nordea
Head of Information Security Office
KEYNOTE | The threat landscape for Nordea – DDoS and lessons learned
Nordea
Head of Information Security Office
KEYNOTE | The threat landscape for Nordea – DDoS and lessons learned

Sanne Bech
Stougaard & Bech
Partner, advokat
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten
Stougaard & Bech
Partner, advokat
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten

Signe Sophus Lai
University of Copenhagen
Tenure Track Assistant Professor
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat
University of Copenhagen
Tenure Track Assistant Professor
Lock-ins og infrastrukturel afhængighed i den dataficerede velfærdsstat

Stig Salskov Iversen
Erhvervsakademi Sydvest
Uddannelseschef for It og Medier
DEBAT | Manglen på it-talenter: Hvordan skaffer vi flere?
Erhvervsakademi Sydvest
Uddannelseschef for It og Medier
DEBAT | Manglen på it-talenter: Hvordan skaffer vi flere?

Susanne Stougaard
Stougaard & Bech Advokater
Partner
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten
Stougaard & Bech Advokater
Partner
Databeskyttelse i AI-projekter: Tænk GDPR og AI-Act ind fra starten

Torsten Schack Pedersen
Venstre
Minister for samfundssikkerhed og beredskab
KEYNOTE | Åbningstale af Minister for samfundssikkerhed og beredskab
Venstre
Minister for samfundssikkerhed og beredskab
KEYNOTE | Åbningstale af Minister for samfundssikkerhed og beredskab


Rabia Yasin Sharif
Senior Account Executive, RISMA Systems
RISMA Systems
NIS2 i Danmark - fra lovkrav til operationelle tiltag
Senior Account Executive, RISMA Systems
RISMA Systems
NIS2 i Danmark - fra lovkrav til operationelle tiltag

Rasmus Bork
Solution Architect, Chrome Enterprise
COMM2IG
Sov trygt med ChromeOS, der aldrig er ramt af ransomware
Sov trygt med ChromeOS, der aldrig er ramt af ransomware
Solution Architect, Chrome Enterprise
COMM2IG
Sov trygt med ChromeOS, der aldrig er ramt af ransomware
Sov trygt med ChromeOS, der aldrig er ramt af ransomware





Simon Ogden
Sr. Solutions Engineer
Cribl
Taming Data Chaos: How to Take Full Control of Your Security Data with Cribl
Sr. Solutions Engineer
Cribl
Taming Data Chaos: How to Take Full Control of Your Security Data with Cribl

Simon Simonsen
Senior Security architect
Crwd
The cybersecurity startup playbook - trends, funding and future giants
Senior Security architect
Crwd
The cybersecurity startup playbook - trends, funding and future giants

Simon Krogh Bjerre
Security Advisor
itm8
Hvem hackede os? En virkelig beretning om at finde de skyldige
Security Advisor
itm8
Hvem hackede os? En virkelig beretning om at finde de skyldige

Sune Orry
Solution Business Manager
Hewlett Packard Enterprise
Modernize data protection with a secured Datacenter by design
Solution Business Manager
Hewlett Packard Enterprise
Modernize data protection with a secured Datacenter by design

Thomas Astin Jensen
Country Manager Denmark & Iceland
Nutanix
Securing the Future: How Nutanix Reduces Risk with a Built-In Security
Country Manager Denmark & Iceland
Nutanix
Securing the Future: How Nutanix Reduces Risk with a Built-In Security


Tim Ayling
Vice President EMEA Cybersecurity Specialists
Thales
Business Logic Attacks: Take Control of an Emerging Threat
Vice President EMEA Cybersecurity Specialists
Thales
Business Logic Attacks: Take Control of an Emerging Threat

Toby Lewis
Global Head of Threat Analysis
Darktrace
The AI Battleground: Defending the Enterprise in the Era of Intelligent Threats
Global Head of Threat Analysis
Darktrace
The AI Battleground: Defending the Enterprise in the Era of Intelligent Threats

Tom Stampe Raavig
Senior Enterprise Security Engineer
Tenable
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.
Senior Enterprise Security Engineer
Tenable
Discover, prioritize, and remediate vulnerabilities across multi-cloud environments.



Visti Malik Brandt-Sørensen
Danish National Cybersecurity Team
Building a Digital Fortress – Practical Resilience for Startups/SMEs
Danish National Cybersecurity Team
Building a Digital Fortress – Practical Resilience for Startups/SMEs

Zahra Khani
Principal Product Manager - IoT Security Assessment
Keysight
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic
Principal Product Manager - IoT Security Assessment
Keysight
X-Ray Vision for Cybersecurity: See Through Your Devices and Traffic




